More on shared-scalar-product protocols

  • Authors:
  • Huafei Zhu;Feng Bao;Tieyan Li;Ying Qiu

  • Affiliations:
  • Department of Information Security, Institute for Infocomm Research, A-Star, Singapore;Department of Information Security, Institute for Infocomm Research, A-Star, Singapore;Department of Information Security, Institute for Infocomm Research, A-Star, Singapore;Department of Information Security, Institute for Infocomm Research, A-Star, Singapore

  • Venue:
  • ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Secure scalar product protocols provide fundamental security components for distributed data mining with privacy concerns. This paper makes two contributions in the shared-scalar-product protocols. In the first fold, a security model for shared-scalar-product protocols in the malicious model is introduced and formalized. In the second fold, an implementation for shared-scalar-product protocols based on the homomorphic cryptographic primitives is proposed which is provably secure assuming that the underling homomorphic encryption scheme is semantically secure and the homomorphic commitment scheme is statistically hiding and computationally binding in the public reference string model. The potential areas of application of this protocol are numerous (e.g., computation of Euclidean distance, oblivious linear auxiliary information computation and so on...).